Read to learn about the fundamental aspects of security and compliance mandates, such as PCI, HIPAA, and GDPR.
The following information is a part of our free cybersecurity and compliance Academy course.
You likely handle and process many types of data at your business every day. Some of it—like your inventory data—may not need protection. However, information your customers give you will most likely need to be protected.
Sensitive data can include:
Depending on what kinds of sensitive data you handle, certain security mandates—like HIPAA, PCI, or GDPR—may apply to you. Each mandate has its own requirements for how you need to handle and process that data. Requirements could include things like data-flow diagrams or risk analyses.
But, regardless of whether any of these mandates apply to your business, it’s crucial that you take seriously the responsibility to protect sensitive data.
This section will outline what you need to know and the steps you need to take.
Organizations should annually perform a formal risk assessment. The purpose of the risk assessment is to help organizations document potential security vulnerabilities, threats, and risks.
A vulnerability is a flaw in system security controls that could lead to sensitive data being improperly accessed. For example, let’s say you have a system that requires your employees to log in using a username and password. That would be a system security control. Let’s imagine that you don’t have a good process in place for removing account access when an employee leaves the company. That lack of process is a vulnerability.
A threat is a person, group, or thing that could take advantage of a vulnerability. For example, what would happen if you have a disgruntled employee who leaves the company? They might want to get back into the system and obtain sensitive data after they were terminated. That disgruntled employee is a threat.
Risk is determined by understanding the probability of a threat exploiting a vulnerability and combining this probability with the potential impact to your organization. Thinking again about our disgruntled employee, how likely is it in your organization that someone will leave your organization and then gain improper access to sensitive data, and what would be the impact to your organization if it happened? That exploit probability combined with exploit impact is your risk.
To protect data, you have to know where it is created, received, transmitted, and maintained in your organization. This is called your scope. To identify your scope, you have to understand how sensitive data flows within your organization.
Start with the assumption that everything is in scope until you’ve verified otherwise. Verifying that a system is out of scope requires that you confirm proper network segmentation and make sure necessary controls are in place.
There are four main parts to consider when defining your scope:
Afterwards, you need to follow all possible leaks, which can be best done by creating a data flow diagram. A data flow diagram documents all the information you found in your environment, and lays it out in a graphical format.
Create a diagram that shows how data enters your network, the systems it touches as it flows through your network, and any point at which it may leave your network.
Once you understand the scope of your environment, you can start listing the vulnerabilities and threats related to that environment. Consider the following:
You need to decide what risks could and/or will impact your organization, your data, and ultimately, your customers. Risk ranking is a crucial part of your risk analysis that will eventually translate to your risk management plan.
The risk analysis outcome, with its risk rankings, provides the basis for your risk management plan. The risk management plan is the step that works through issues discovered in the risk analysis and provides a documented instance proving your active acknowledgment (and correction) of data risks.
It’s difficult—if not impossible—to find every weakness in your organization on your own. To take your security to the next level and to avoid weaknesses in your system, consider implementing additional security services such as:
A complete and thorough risk analysis is critical as the launching pad for securing your sensitive information.
The purpose of the risk analysis is to help organizations document potential security vulnerabilities, threats, and risks.
Additional Resources:
If you need to keep data on your systems for any period of time, you should encrypt it. Encryption renders stored data useless to attackers by turning it into unusable strings of indecipherable characters. Because encryption technology is very specialized and very complex, it is not a good idea to come up with your own encryption algorithms, always use an industry accepted and proven encryption method.
Industry best practice would be to use these encryption types: AES-128, AES-256, or better.
If you get into encryption of card data (or other sensitive data), the most common mistake is poor encryption key management. The keys used to encrypt data must be protected very carefully and not shared openly or easily. Key management process is typically a pretty involved process be sure to get some help as you develop your process for protecting, using and changing encryption keys.
Due to the complexity of encryption rules, some SMB organizations choose not to store sensitive information at all but pass it on to service providers to look after. You can use technologies such as 3rd party tokenization or data vaults to store your sensitive data.
Historically, one of the largest reported threats to electronic data has been loss or theft of a physical device. While employing adequate physical security and mobile device procedures is the first line of defense to prevent these types of incidents, they still sometimes occur despite an organization’s best efforts.
Which is why full disk encryption is the best way to protect you from penalties associated with a breach when a device is lost or stolen. For example, the HITECH act of 2009 modified the HIPAA Breach Notification Rule, stating that if a device is lost or stolen and it can be proven that the data is unreadable by either secure destruction or encryption, the loss may not need to be reported as a breach.
Full disk encryption for laptops and desktops is very easy to put into use and usually comes with no additional cost as most current operating systems come equipped with the capability. But most of these solutions rely on your login password as a key for the decryption; this means that your full disk encryption is only as secure as your login password. There is full disk encryption software that can be installed that do not rely on your login password but implement a second decryption passphrase. This is more secure but less user-friendly.
If you can, avoid storing sensitive information on any type of mobile computing platform (such as laptops, smartphones, tablets) to limit the threat of a data breach altogether.
If you need to store data on smartphones or tablets, you need to be mindful because encryption software may not be as readily-available and easy to maintain from a corporate perspective. Don’t forget about these mobile devices when conducting your risk assessment; be sure to consider the access to and presence of sensitive data on these platforms.
Additionally, if you backup your mobile device on your hard drive, ensure the backups are encrypted.
Additional Resources:
As you work on your risk management plan, place high priority on removing any unnecessary sensitive data.
The first step to managing/deleting old data is deciding how long you need to keep data. For example, many states have requirements on the amount of time that healthcare organizations must keep patient data. This can be for uses and disclosures and even the patient record. Hence, organizations commonly maintain data for a minimum of a decade. Also, if a patient has passed away, there will be additional requirements for data retention that healthcare organizations need to consider.
If you delete sensitive information such as patient records, Social Security Numbers, credit card numbers, it’s probably still on your computer and accessible to attackers. When you empty the Recycle Bin or Trash, it doesn’t actually wipe the files off your computer. It simply marks the files as acceptable to overwrite and are generally no longer visible to the user.
For the average user, those files are nearly impossible to retrieve because the operating system deletes the references to those files. Yes, your computer can’t find those files for you anymore, but they still exist. For those with more advanced computer skills (aka hackers), that data is still accessible by looking at the unallocated disk space.
Think of the Recycle Bin or Empty Trash like putting sensitive documents in the trash can next to your desk. You can easily retrieve these documents if you need to. All you do is pull them out of the trashcan.
Overwriting is the process where software or hardware products are used to overwrite media with non-sensitive data. It can be a great way to securely delete sensitive data on systems still in use. However, make sure that you use an iterative overwrite on all the data referenced, not just part of it.
Degaussing on the other hand is useful if you have magnetic tapes and hard drives. Degaussing uses a special device that uses an electro-magnet with massive field strength to erase data on magnetic media. This method is particularly helpful if you want to reuse the hardware.
One of the most secure methods to permanently delete data is to physically destroy it. Prior to destruction, keep the media in a locked container labeled something like “To Be Shredded”.
You can then go to an organization that has industrial-sized shredders to dispose of larger hardware. Some types of media require physical destruction for secure data deletion. Solid state drives (SSD) and optical media like DVDs and CDs generally must be destroyed physically.
When thinking about how to permanently delete files off your network, don’t forget about any archived data, including:
Additional Resources:
Many organizations nowadays have wireless networks (i.e., Wi-Fi), with guest Wi-Fi access becoming a norm. The problem is many offices don’t have their Wi-Fi set up correctly with adequate encryption, turning this free amenity into a liability.
This is also the case if you do not segment guest and non-guest wireless networks with a firewall. If you haven’t segmented your networks, you probably have allowed access to your system and data, and you don’t even know it. Guest wireless networks should always be segmented from your non-guest wireless network by a firewall.
In addition, make sure that only staff can connect to your non-guest network(s) with approved devices, and these devices follow your BYOD policies.
Based on vulnerabilities in web encryption, if your organization has existing implementations of SSL and early TLS not necessary for regular business operations, immediately remove or discontinue all instances. New implementations should not use SSL or early TLS.
If you need to continue using SSL/early TLS, consider implementing the following:
Security best practice is to set up your Wi-Fi with Wi-Fi Protected Access II also known as WPA2. Since 2006, WPA2 has been the most secure wireless encryption standard. For additional protection, use a virtual private network or VPN to encrypt your Internet traffic.
Avoid using outdated wired equivalent privacy (WEP) encryption, as it is easy to compromise.
Another important safety aspect is to make sure the Wi-Fi password is secure. Don’t use the default password or username that comes with the wireless router.
Rogue wireless access points can allow attackers unauthorized access to secure networks, granting them the access to attack your network remotely.
Which is why it’s vital to scan for rogue wireless access points, particularly if they are attached to your non-guest network. This helps you identify which access points need to be changed.
Remote access applications, such as GoToMyPC, LogMeIn, pcAnywhere, or RemotePC allow employees to work from home. For example, doctors often prefer to access patient data outside of the office, and some IT and support teams use remote access to manage the network offsite.
Remote access is great for workforce convenience, but can cause issues for security. Often, remote access is not properly implemented with adequate security, such as implementing multi-factor authentication.
Attackers commonly target organizations that use remote access applications. If a remote access application is vulnerable, it allows an attacker to completely bypass firewalls and gain direct access to sensitive networks and data.
Remote access can be secure as long as it uses strong encryption and requires at least two independent methods of authentication. Be sure to enable strong/high encryption levels in your remote access configuration.
Configuring multi-factor authentication requires at least two of the following three factors:
A few examples of effective multi-factor authentication include:
Multi-factor authentication makes things difficult for attackers. For example, if you implement google authenticator on your phone, an attacker would have to learn your password and have your cell phone before being able to gain remote access to your systems.
Ideally, your authentication mechanisms should be independent of each other; or in other terms, there’s a physical separation between mechanisms, so that access to one factor does not grant access to another, and if one factor is compromised, it does not affect the integrity or confidentiality of any other factor.
If a remote access application configuration only requires a username and password, the application has been configured insecurely.
Additional Resources:
Question 1:
You dispose of sensitive documents by… (Choose only ONE best answer.)
Question 2:
You should conduct risk assessments… (Choose only ONE best answer.)
Question 3:
Which of the following can be used as multi-factor authentication factors: (Choose only ONE best answer.)
Question 4:
If you need to store sensitive data, you should… (Choose only ONE best answer.)
Answer Code: Q1: C, Q2: C, Q3: D, Q4: B